cloud_computing_1

 Write a 2-3 page paper where you compare and contrast the differences between IDaaS, IaaS and IAM. The submission needs to include a minimal of 3 scholarly resources in APA format. 

Please include it citations and reference. Need it my 11/01 by 11:30 am.

Discussion

 

  • Distinguish among character, block, and stream ciphers.
     
  • Specify when to use each.

e

RM-RESEARCH-12

RESEARCH:

Need this research paper by Saturday USA time. (5 days from now).

4 pages full excluding references and cover page. Follow APA 7 format and citations.

TOPIC:

After reading the required articles this week, please write a research paper that answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

assignment Urgant

6pages and Format APA

Based on your previous work in the previous week,createa 700-word entry in yourDatabase Management Plan.

Infrastucture and Security

 

This is a two-part deliverable using MS Word and MS Visio, or their open source equivalents. You are the chief security officer (CSO) of a law office that occupies four floors of a high-rise building in downtown Washington, D.C. There are approximately 50 PCs on the first floor, 150 PCs on the second floor, and 40 PCs on both the third and fourth floors. The servers for each department reside on their respective floors. The director of the accounting department has expressed concerns about the security of his files. For this assignment, you will explain the key functions of a cybersecurity policy catalog. Note: You may create or make all necessary assumptions needed for the completion of this assignment.

Submission Requirements
  • Document (MS Word).
  • Microsoft Visio Plan (MS Visio).
Section 1

Write a 3–4 page deliverable in which you:

  • Explain the major cyber governance issues in an organization, and examine how organizations develop communication protocols because of those issues.
  • Describe the security issues found on a network, and arrange them from highest to lowest, mapping out security loopholes to justify your answer.
  • Differentiate between intellectual property theft and cyber espionage. Determine how you, as the CSO of an organization, would deal with both cases and what standard operating procedures you would follow.
Section 2

IT PROJECT (NO WRITTING NEEDED) TECHNICAL Cisco Packet Tracer PKT file only

 ***I require only the Packet Tracer file for the working redesign listed below in the requirements***

IT INFRASTRUCTURE PROJECT PHASE I INSTRUCTIONS 

All labs must be submitted using the version of Packet Tracer in the online course/learning management system. Please do NOT use other versions of Packet Tracer to assure licensing compliance and proper assessment/credit. In addition, please do NOT add users or passwords to any device, leave all credentials blank for assessment purposes. 

Project Background 

Please reference Figure 1. Friendly Care Hospital is one of the biggest hospitals in DC. You have recently bought the hospital, naming it [Your Firstname Lastname] Hospital. For example, Jane Doe Hospital. Jane Doe Hospital owns a 5-story building and houses many departments that span multiple floors. Its Radiology department is spread across the first and second floors, connected by a dedicated local area network (LAN). The department has recently deployed a new “Radiology Images” application as part of their initiative to digitize patient records. However, the department staff sometimes faces long application delays during busy hours. It also experiences regular delays in Internet connectivity, FTPS services, web services, and email services. 

Their original design, depicted in Figure 1, was categorized as a small network, providing services for up to 200-500 devices. They have well surpassed this. You, as their senior network administrator, are tasked with the job of a complete re-design. This design must support a medium to large sized network for over 1,000 devices. Thus, it should surpass the current capabilities. 

Figure 1. Current Friendly Care Hospital Network Design 

 

Project Overview  

In this project, you will study performance improvements in a congested, wired LAN/WAN environment that can be solved to varying degrees by a new IT infrastructure design and fully functional implementation in Packet Tracer.  To learn more about Packet Tracer please read the Cisco Packet Tracer DS PDF. Later, in Phase II of the project, you will scale this design to a larger enterprise IT infrastructure. 

To begin the projects, you will complete a review of related literature to identify what is appropriate to improve system feasibility, RAS (reliability, availability, serviceability), security, and disaster recovery of the existing IT infrastructure and model of your hospital. Once this review of literature is complete, you will use the outcomes and research results to advance and improve the IT infrastructure. Proper data analysis, comparison, and contrast will be summarized within in-text tables and figures as well as appendixes to explain the results of the IT infrastructure re-design and improvement. 

Packet Tracer is limited given it is a simulator. Be creative! For instance, if Packet Tracer does not have a file sharing service for a file sharing server, turn on any other related and relevant services that are available. As another example, use LAN and WAN protocols that are optimal given what the version of Packet Tracer allows. You will be assessed based upon optimal configurations in the version of Packet Tracer used. Thus, assure this is well studied. Research will outline new opportunities for future IT infrastructure designs, and this should be discussed accordingly in the written paper even if not configured in Packet Tracer. Often, new technologies are not implemented in industry immediately due to limitations such as hardware architecture. 

Please verify all requirements are met by reviewing the grading rubric. Below is an outline of minimum requirements with examples and ideas. 

Minimum Project Requirements 

• Submit a working Packet Tracer lab, typically this file has a .pkt file extension. 

o This will include the fully operational new IT infrastructure design o All devices in the lab must be named with your first name and last name 

▪ Example: Jane_Doe_Router_1 o All hardware and software should be configured properly and should be able to communicate using optimized networking designs, configurations, and protocols 

o No devices should have passwords for assessment purposes 

• Minimum IT Infrastructure Design and Packet Tracer Requirements o You must start with a blank/new Packet Tracer file, existing labs or modified labs of existing solutions will receive a zero without exception 

o Design a medium-size hospital IT infrastructure for well over 1,000 devices, and scalable beyond the Figure 1 example 

▪ For example, a design that goes beyond traditional N-Tier designs 

▪ Design proper addressing via IPv4 and/or IPv6 that scales 

▪ Add appropriate routers and switches to support this new design 

▪ Configure at least one appropriate networking protocol, operational across the entire infrastructure 

▪ Use proper network address translation (NAT) 

▪ Implement private and public IP address spaces correctly 

▪ Assure network traffic is organized, efficient, and secured properly (e.g. limit broadcast domains, do not allow marketing employees to access accounting systems, etc) 

o Add an Internet Service Provider (ISP) into the design o Add enough modularity, resiliency, and flexibility into the design o Design and implement the following new services and servers 

▪ A Dynamic Host Configuration Protocol (DHCP) server that automatically assigns working IP addresses to new workstations 

▪ A name server that manages the Domain Name System (DNS) for all servers in the hospital 

▪ A web server hosted on the Internet 

▪ Two new user workstations located at each level of the building that can use the new services properly 

• Show these services working on each workstation in your project (e.g. a website from the web server, DHCP, etc) 

Provide a few hospital departments as examples beyond radiology 

Network Implementation

 

  1. Search the internet for best practices with respect to technology implementation.
  2. From your research, select the 3 recommendations that you feel are the most likely to ensure a successful implementation and your reasons why.
  3. Include in your report the ways that you would increase the probability of success with new technology implementations.
  4. With respect to an organizations environment and culture (including operational, ethical, social, legal, and economic issues impacting the design of information technology systems), what steps would you take to ensure success?

CC-5

 
Discuss in 500 words or more the differences between and advantages of MAC, DAC, and RBAC. 

Cloud Computing

 

Consider, in 500 words or more, how business processes as services can improve efficiency. This discussion is about business process as a service and security. 

Use at least three sources. Use the Research Databases available from the Danforth Library not Google.   Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.